Personal Data And The Right Of Access

Size: px
Start display at page:

Download "Personal Data And The Right Of Access"

Transcription

1 2010 IEEE 6th World Congress on Services Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions Ralph Herkenhöner Hermann de Meer Computer Networks and Communications, University of Passau, Germany {rhk Meiko Jensen Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany Henrich C. Pöhls Chair of IT Security, University of Passau, Germany Abstract Enforcing the right of access to personal data usually is a long-running process between a data subject and an organization that processes personal data. As of today, this task is commonly realized using a manual process based on postal communication or personal attendance and ends up conflicting with trade secret protection. In this paper, we present an automated architecture to enable exercising the right of access in the domain of inter-organizational business processes based on Web Services technology. Deriving its requirements from the legal, economical, and technical obligations, we show the architecture s overall approach solving the conflict between trade secret and exercising the right of access. I. INTRODUCTION According to legal obligations, every company that processes personal data must provide the data subject with means to query the company about what information is stored, processed, and exchanged with other companies. This right of access is usually provided as a manual process, requiring the data subject to place his request in person or via postal mail. Additionally, such a request will only cover the personal data regarding a certain company. In times of inter-organizational business processes and worldwide supply chains, this implies that the data subject has to query every company within such a business process in order to determine the full processing path his personal data took. In contrast, a majority of inter-organizational business processes of today is realized using technical infrastructures like Web Services. It would be reasonable to provide information on processing of personal data according to the right of access as a dedicated Web Service itself. This way, the providing can be performed automatically, hence saving operational costs and enabling a company s customer to easily monitor the processing of his personal data. To the best of our knowledge, there exists no approach built on Web Services to fulfill the legal requirements originating from data protection law in an automated way. However, a business process involving any The research of R. H. and H. d. M. has been partially supported by the project insel (Funding-Id: 01 S08016B) of the Federal Ministry of Education and Research (BMBF) of the Federal Republic of Germany, and by the Euro- NF network of excellence (IST ) of the European Union. data about customers will most likely result in a Web Service processing personal data. This is covered by data protection laws. In this paper, we take the European data protection law codified in EU Directive 95/46/EC [1] as an example. In this context, personal data shall mean any information relating to an identified or identifiable natural person (data subject) [1]. In a common business process, the customer is the data subject and gives his personal data to a primary Web Service. The primary Web Service then forwards it fully or partially to its successors, and so forth. Each company that is given any part of that data which is still considered personal becomes a controller. A controller is required by law to grant the data subject the right of access among others. The right of access allows the data subject to determine which categories of data are being processed and the purpose of the processing. According to law, the controller s answer should also include the sources and the recipients of the personal data if forwarded to successors. We call this process providing of information. However, this poses a problem for real-world business processes, since a company might consider business partners or customers a trade secret. To protect such trade secrets, a controller can reply with categories of recipients rather than identifying them directly. In complex business processes, such categorized answers lead the data subject s request to a dead end, as preceding and succeeding processing of personal data and involved controllers remains hidden. This is a major shortcoming in the existing practice of information providing. Based on these observations, we identified the following problems: A business process, realized as an interorganizational service composition, does not automatically allow the data subject to exercise his right of access while preserving trade secrets of the participants. In current practice, requests of the data subject are handled by manual investigation and sending paper letters. This implies four major challenges to address: Cost-efficient scalability: A company taking part in a service composition has no efficient automated way to answer the data subject s requests. If business transactions /10 $ IEEE DOI /SERVICES

2 increase, Web Services are able to scale, but manual processes involving human agents answering the requests do not. Companies have to find means to comply with legal requirements with minimal operational costs. Authentication of requests: An answer must only be given to a request from an authorized data subject. Protecting trade secrets while answering requests: The answer to a request on processing of personal data may violate trade secrets. Giving this information would allow to reconstruct all companies involved in a business process along with their position within it. Confidential information providing: The answer has to be delivered exclusively to the data subject, to prevent illegal disclosure of personal data. In order to provide a solution for these issues we propose an extension of existing service-oriented architectures (SOA) based on Web Services technology that implements the right of access given by the European data protection law. We show that our approach solves all of the presented challenges in the best possible way. In order to understand the problems behind interorganizational business processes and the right of access, we refine the legal, business, and technical requirements and constraints in Section II. In Section III, we present the overall approach, showing its interactions, message formats, and security-relevant details. We discuss how our solution technically fulfills legal and business obligations in Section IV. Finally, we conclude in Section V. II. REQUIREMENT ANALYSIS To develop a full automation of providing information according to the right of access, we investigate all of its requirements and influencing factors in the following section. A. Legal Obligations In the European Union, the right of access is legally based on the Directive 95/46/EC [1]. Its intention is to guarantee any person the right of access to obtain information about the processing of his personal data. This right has to be exercised that neither it adversely affect[s] trade secrets nor protection of trade secrets results in refusing all information ([1], Recital 41). In any case of collection of data from the data subject, the controller has to provide the data subject with at least the identity of the controller and of his representative, the purposes of the processing, and the recipients or categories of recipients of the data ([1], Art. 10). This is usually stated in a company s privacy policy. The data subject can get further information by exercising his right of access. Then the controller in accordance with Art. 12 [1] has to confirm whether or not data of the data subject is being processed, and if yes, he has to provide information as to purposes of the processing, categories of data concerned, recipients or categories of recipients, sources of the data, data undergoing processing (e.g. adress), and logic involved (e.g. scoring) in any automatic processing. To protect trade secrets or other vital interests of the controller or its business partners, the controller may refuse to provide the information on data undergoing processing and logic involved in any automatic processing. Alternatively, he is allowed to reduce the provided information to an abstract level. For the same reason, he is also allowed to anonymize the recipients and state them by category. B. Business Obligations For a businesses entity, called company, major business requirements are cost effectiveness and protection of its trade secrets (see e.g. [2]). Of course, the company also has to operate within legal boundaries. While legal compliance can be reached by having manual processes to comply with Directive 95/46/EC, such an architecture does not scale and will not be cost-efficient if the number of customers exercising their right of access increases. In particular, the data subject could normally not be billed for this service. To keep the operational costs low, most of the requests should be answered automatically. To stay in business, a company has to protect its trade secrets, i.e. internal workings, customers, and subcontractors. If a group of companies is working together to provide a certain functionality, they don t have to know about each other being involved. Thus, the overall view of the complete business process is not necessarily known to all of the process participants. While each company strives to protect their trade secrets, a more generalized abstract view might be tolerable, i.e. by hiding the customers and subcontractors identities. C. Technical Foundations A common architecture for realizing inter-organizational business processes is based on the paradigm of serviceorientation (Service-Oriented Architectures, SOA [3]). This paradigm defines that every business unit (e.g. a company) within a business process provides its functionality via an explicit service interface that contains all data necessary to use its functionality. Hence, every service within a business process has its service provider and one or more service users that integrate its functionality within their own applications, which again are provided as services. However, a service provider is not required (and as stated above not supposed) to know details about the functionality of its service users (predecessors). Vice versa, a service user may not know about the internal operations of a service, e.g. whether it again relies on further services (successors) or provides its functionality all by itself. The most widespread technical realization for SOAs are Web Services. Their specifications [4] cover all aspects of providing and using a service via communication networks, such as service descriptions (WSDL, WS-Policy), message formats (SOAP, REST), or non-functional properties (WS-Security, WS-Trust). For service composition, the WS- BPEL specification [5] can be used for a full description of Web-Services-based business processes. It covers all aspects 646

3 of service usage, service providing, and simple workflow functionality. Within BPEL-described business processes, a fundamental concept that will be necessary to understand the remainder of this paper is the mechanism of correlation sets. These sets are defined in the BPEL language and can be used to uniquely identify BPEL process instances during their execution and after termination. The underlying observation is that for every two business partners exchanging business process data there usually exists a mechanism for business process instance identification. Common approaches for this identification are e.g. assigning unique ID values or using a unique subset of the data itself (e.g. a customer s first name, last name and date of birth). Hence, the overall BPEL process instance can be uniquely identified using a full identifier of any of the communication identifiers between the BPEL process and any one of its partners. A correlation set is defined as the union of all unique identifiers used between the BPEL process and all of its communication partners. For the scope of this paper, we will reduce the use of these correlation sets as follows. We assume that every communication of a BPEL-based business process is associated to exactly one correlation set that always provides appropriate full identifier for all of its incoming and outgoing communications. Then, every unique identifier from every communication partner can be traced back to all of the other communications that occurred during the execution of the same BPEL process instance. We further assume the unique identifiers to contain a sufficient amount of entropy to provide a minimum level of randomness, so that there is no efficient approach to guess these identifiers if they are not known a priori. III. RIGHT OF ACCESS AS A WEB SERVICE Based on the requirements analysis from the previous section, this section introduces a full solution to the stated problems. The rationale behind certain design decisions are provided in the discussion in Section IV. In the following we will first give a high level description of interactions, then we will give implementation details like message format, and finally talk about the underlying security design and assumptions. A. Technical Architecture The proposed architecture to automate the providing of information as to the processing of personal data is based on the assumption of an underlying web of service-oriented business processes. Thus, every personal data of a data subject has once been processed by business partners interacting according to a defined service composition. When exercising his right of access, a data subject may address any of those business partners. This initial request, which we call Right of Access:Request (ROAR), is directed towards a company within the service composition. The result of such a request will be a full report on that company s processing of personal data of the data subject. We call this report the ROAR response. Besides the ROAR request, a company may provide the additional service to ask its business partners about personal data of the data subject, insofar they were involved in the same business process. Hence, a company may request personal data of the data subject from its adjacent business partners, which will also be added to the ROAR response. This type of request, which we call Right of Access:Delegated (ROAD), is only triggered by a ROAR request or a previous ROAD request. It is carried out between business partners that know and trust each other, and only if both companies are involved in a business process that previously processed personal data of the requesting data subject. As with the original business processes itself, the ROAR and ROAD requests and responses are realized using Web Services technologies. Hence, every company provides a dedicated additional service interface for requesting information. This service interface is either embedded within the service s description itself, or realized as an independent, company-wide business unit, dedicated to the sole purpose of processing ROAR and ROAD queries. Though intentionally being rather alike, the two request types of ROAR and ROAD differ slightly, in particular regarding their message formats and security requirements. We will give a description of each in the following. 1) 3) 1 C1 C3 C4 ROAR with ROAD from user to C2 1 C2 C1 C C3 C4 ROAR with ROAD from user to C4 Fig C5 C6 C7 C5 C6 C7 2) 1 4) C1 C2 C3 C4 ROAR with ROAD from user to C6 1 C1 C2 3 4 ROAR only from user to C4 C3 C4 2 C5 C6 C7 C5 C6 C7 Flow of requests: ROAR requests can induce further ROAD requests 1) Providing information to the Data Subject (ROAR): In this interaction, the request originates at the data subject and is directed to any controller within the service composition. This may be the company the data subject once directly interacted with (e.g. during a purchase), but may also be an arbitrary company the data subject came across for a certain purpose. To exercise his right of access, the data subject has to create a ROAR request message according to the ROAR s Web Service description (given in WSDL [6]), and send that message to the particular company s ROAR service endpoint. To provide the answer, the controller has to authenticate the request, collect all necessary information including all information about sources and recipients of personal data and send it back to the data subject. Thus, with a ROAR response the data subject gets information regarding the processing of his 647

4 personal data as far as the queried company was involved. We call this the local view. 2) Querying Information on Behalf of the Data Subject (ROAD): Typically, a data subject is not satisfied with the local view provided by a single company, if he wants to assess the impact of data processing in a whole business process. As an example, in Figure 1 case 4, the ROAR response of C4 might among other information state that a certain personal data item, e.g. an address, was received from C1 and forwarded to C7. A typical continuation for the data subject would be to query C1 and C7 to determine the processing of the personal data in the whole business process. However, this approach would result in the data subject having to wade through many ROAR responses and reconstruct the internal linkings by himself. To avoid this, a company wants to provide the data subject with the additional service to query its adjacent business partners on behalf of the data subject. If a company has passed personal data to its business partners, it has to query them first in order to provide an enhanced ROAR response. In that case, the company places a bunch of new requests to all of its adjacent business partners involved in that particular business process. We call this second type of request Right of Access:Delegated (ROAD), since the data subject delegates its right of access to a company that then acts on behalf of the data subject. A company queried by a ROAD request spawns a number of own ROAD requests, aggregates their ROAD responses respectively, and completes its own ROAD response by adding information regarding its local data processing. In order to illustrate the overall process created by ROAR and ROAD, Figure 1 shows four different examples of ROAR and ROAD requests and responses. The first case shows the data subject querying its directly adjacent company C2 (for instance, this may be an online shop where the data subject once bought something). The user sends a ROAR request to C2 s ROAR Web Service endpoint. Company C2 determines that one of the personal data items (e.g. data subject s address) it holds was passed to the business partner C4 (e.g. a supplier). Hence, C2 creates a ROAD request querying C4 directly for information regarding that particular interaction only. In the same way as C2, C4 determines that it passed the data item to companies C5, C6, C7 (e.g. billing provider, delivery, and marketing service). C4 queries each of them using an appropriate ROAD request. C5, C6, and C7 determine that they had processed the data item themselves, but did not pass it to any other business partner. All of them respond to their particular ROAD request, providing information as to what they did with the personal data item in question, and for what purpose. Collecting these replies, C4 creates its own ROAD reply, which includes the ROAD responses of C5, C6, C7, and sends it to C2. Finally, C2 answers the initial ROAR request by the data subject with a full report on what happened to the personal data. It is important to note that C4 did not ask C1 for input, even though it is possible that personal data may have been received via C1. That data is not part of the local view of the initially queried C2. Hence, it is not to be included in C2 s ROAR response. However, C4 is able to determine which data of the data subject it received via C1 and which arrived via C2 facilitating the correlation sets (cf. Section II-C). The second case of Figure 1 shows the process when the data subject directly queries C6. Again, C6 determines that it has not forwarded personal data, but that it has received personal data from C4. In order to give an enhanced answer to the posed ROAR request, C6 will trigger a ROAD request towards C4, asking for additional information regarding the data sources. Then, C4 determines that it has received personal data via C1 and C2 and propagates the ROAD request to both of them. Note that neither C5 nor C7 are queried by C4, as they do not belong to the process that lead to the source of the personal data ending up at C6. In the same way as before, the ROAD answers of C1 and C2 are aggregated in C4 s ROAD response, which is incorporated in C6 s ROAR response to the data subject. Straightforward, case 3 of Figure 1 illustrates a ROAR request on C4. This implies ROAD requests being propagated in both directions: towards predecessors and successors of C4. Again, there are no ROAD requests sent to C3, as it is not part of the business processes involving C4. As before, the responses are collected and put in the ROAR response of C4. For comparison, Figure 1 case 4 shows the result of case 3 if no ROAD requests are sent. Here, the data subject will not gain any information regarding companies beyond the local information of C4. It would be required to ask each of C4 s adjacent companies directly (using ROAR) in order to gain the complete view on the personal data s trail. B. Message Structure On the technical side, the ROAR and ROAD services are realized using Web Services specifications. Consequently, putting message data to the wire is straightforward use of WSDL and SOAP standards. In the following, we will give a description on the message structure of both ROAR and ROAD requests and responses. Cryptographic means applied to these are introduced in the next section. The request messages of ROAR and ROAD services are rather simple. For ROAR, the request message contains a data subject identifier along with an authentication token and a request ID. Once a ROAR request is placed at a company s ROAR service, that company may decide to request other companies of a certain business process. These ROAD requests are very similar to the ROAR requests, but additionally contain an identifier of the ROAD requester. That identifier is a correlation set instance (cf. Section II-C) identifying the exact service interaction. Besides that, a ROAD request also contains an anonymity flag. This flag signals that data sources and recipients provided in the ROAD answers have to be categorized (instead giving of the companies name and its representatives). Thus, a company in the workflow can signal to preserve its trading secret. Once the anonymity flag is set, 648

5 Fig. 2. ROAR response message for a ROAR request to C4 of Figure 1 case 3) it remains set for every subsequent ROAD request. A more indepth discussion on the issues of ROAR and ROAD requests beyond their technical realization is given in Section IV-B. The structure of the ROAR and ROAD response messages is more complex (see Figure 2). As can be seen, a ROAR response message (here an example for a ROAR request towards C4 in the case 3 of Figure 1) contains three distinctive blocks: data sources, data processing information, and data recipients. For each ROAR response, a set of ROAD source blocks is given (disclosing the personal data s origins, here C1 and C2), as well as a set of ROAD recipient blocks of companies that directly received personal data from C4 (here C5, C6, C7). The third block contains the unique request identifier of the overall ROAR request as well as all information regarding C4 s operations on the personal data. It lists the company s business category (e.g. delivery), full name and a legal representatives identity (e.g. Federal Express Corporation Inc. and Frederick W. Smith), ROAR service endpoint (in case the data subject wants to place another ROAR request), and a description of all operations done to the personal data of the data subject within the company. Within the last field, every processing step of personal data within a company is listed, denoting that data s origin, processing steps, purposes of processing, and recipients (cf. Section II-A). The ROAD blocks contained within the ROAR response illustrate the result of the subsequent ROAD requests triggered by the ROAR request (here to C1,C2,C5,C6,C7). They contain the same kind of information as for the ROAR response, but list either additional sources (for data origin ROADs) or additional recipients (for data forwarding ROADs). Each such ROAD block also contains the same set of data processing information as the ROAR response, i.e. category, company, and provided information. For the special case of the data source being the data subject itself (e.g. for C1 and C2), the source list is left empty, and the data subject is denoted directly within the provided information field. The same applies for personal data being forwarded to the data subject, if ever. Being a recursive message format, it is possible to illustrate the full spanning tree of data processing instances for the personal data. It discloses all companies involved in processing such data, along with their correlation. Hence, it gives the data subject a very broad view on the data processing network as a whole. Note that though it is possible for the chain of data processing instances to contain loops (i.e. a data item is sent back to a previous processing instance), this does not affect the proposed architecture, since the business process endpoint and hence the processing logic is different from the processing logic in the first pass. Hence, the ROAD response might contain the very same company more than once, but there is no threat of infinite recursion. C. Security: Assumptions, Design, and Cryptographic Means The ROAR/ROAD services are designed to achieve the following security goals: Request authorization, confidential providing of information, and trade secret protection. We assume that a ROAR/ROAD message between two Web Services additionally fulfills the following requirements: a message s integrity is protected, its origin can be authenticated, it is not possible to repudiate transmission or receipt of the message, and a message s confidentiality is protected appropriately (partially or completely). How trust in a certain company or human user is actually established goes beyond the scope of this paper. We use a sanitizable digital signature scheme (cf. [7]) for request authentication. In a nutshell, to validate the signature in a sanitizable signature scheme either the original data or a blinded version must be present. For ease of use we use a sanitization scheme which allows everyone to blind data items, so without exercising disclosure control [8]. Further, an asymmetric public key encryption scheme is used for confidentiality protection. We allow users to have more than one identity [9] by using a different key-pair for each identity. This, and the rational behind other design decisions is discussed in detail in Section IV. 649

6 1) Request Authorization: Each request message, by assumption, is from an authentic source, integrity protected and cannot be repudiated. Additionally, each ROAR or ROAD request carries a credential called authenticator. This message s authenticator is used to ensure that only the data subject or someone acting on his behalf shall be able to successfully place requests. We differentiate four types of authenticators: data-subject-authenticator: An unforgeable token that allows controllers to associate the data affected by the requested action with a data subject. As a prerequisite, this requires a slight change to the implementation of the underlying business processes. More precisely, the data subject is required to digitally sign the personal data once before it gives it to any company as part of a business process execution (cf. [10]). That signature is the data-subject-authenticator. It must be retained throughout all business processes along with the personal data. However, as personal data items may be split during a business process execution, this approach requires the use of sanitizable signature schemes in order to remove data fragments while keeping the signature s validity. In order to authenticate a ROAR request the data subject proofs fresh knowledge of the private key by signing the ROAR request using the same private key that signed the personal data that was used in the initial business process executions. Hence, the controller can verify that the private key used for signing the ROAR request matches the private key used for signing the personal data that the controller has on record. This way, a data subject can authenticate ROAR requests to any Web Service in the composition. Additionally, every controller can verify the request from a data subject without the need of a direct relationship to be established a priori, and without the need for a public key infrastructure. controller-authenticator: An unforgeable token identifying a controller as a participant of a certain service composition. context-authenticator: A token containing elements from a correlation set (cf. Section II-C). Thus, controllers are able to associate the affected data with all Web Service interactions that involved that particular requester. This authenticator works without any additional changes to the underlying business process implementations. data-knowledge-authenticator: This authenticator is not a single token. The controller demands the requester for values of certain data items from the personal data in question (i.e. name, postal address, and age). The controller compares if the requester s values match the ones she stored locally. If both match, the request is authenticated by proving data knowledge. This is a fallback, mimicking the existing process for postal requests. Depending on the actual business process scenario, these authorization methods can also be used in combination. 2) Confidential Providing of Information: Each controller must make sure that only the valid data subject is provided with the information gathered by ROAR requests. We achieve this by encrypting the relevant parts with a public key that belongs to a private key that is known only to the data subject and was associated with him during the authentication (as explained above). In all ROAR and ROAD replies, the following parts are encrypted: Provided information, List of data sources, and List of data recipients. 3) Confidentiality of Trade Secrets: A company might not want to reveal the identities of its succeeding business partners, as that knowledge may be a trade secret (e.g. for resellers in a supply chain). Hence, when receiving a ROAD request from its predecessor (or a ROAR request from the data subject himself), that company may decide to keep its successors confidential even in the ROAD/ROAR responses. However, as this approach conflicts with the data subject s legitimate right of access, a company may decide to reveal the generalized category of its successors (e.g. a marketing service ), but blind out the actual name and contact information (i.e. the company and ROAR fields of the particular ROAD response message). The same holds true for upwards directed (querying predecessors) requests. In order to enable the data subject to verify that ROAD response s integrity, we use a sanitizable signature scheme for signing the ROAD responses so that it becomes possible to blind out those two data fields without breaking the message s signature. For the example given in Figure 2, company C4 may decide whether it wants to reveal C5 s identity to the data subject or not. Nevertheless, the data subject can still verify the signature of C5 s ROAD block. However, C5 might have additional successors whose ROAD responses are contained within C5 s ROAD response. As these might name C5 explicitly, we need the anonymity flag introduced in Section III-A in order to tell C5 (and all of its successors) already within the ROAD request that they must not include that data in their ROAD responses. In such a scenario, the data subject will get a ROAR response that lists all organizations that processed its personal data. If an organization s identity belongs to a trade secret, the overall business process part below that organization is reduced to information anonymized by category. Note that this nevertheless reveals far more useful information than the (more simple) approach of not propagating ROAD requests to secret business partners at all. IV. DISCUSSION In this Section the merits and flaws of the proposed approach will be discussed. It is demonstrated that the approach not only suits well for the requirements stated in Section II but also improves requests to multiple controllers of a business process. In particular, it shows how the approach can help solving the conflict between the right of access and the trade secret, and therefore is creating added value for the data subject and the controllers. The Directive 95/46/EC [1] is implemented by national law of each EU Member State. In the following, we will discuss the basis of the German implementation of data 650

7 protection law (BDSG [11]). This will help to give a more detailed understanding on how legal obligation can be fulfilled. However, the argumentation is valid for any EU Member State, since the law is unified by the Directive [1]. A. Merits and Flaws of using Web Services On the merits side, our approach is beneficial as the service is available for everyone using the Web Service architecture. For the data subject, this is a known access point and the request is automatically in the right place. In comparison to non-technical requests, there is no need for internal forwarding to the official in charge. In the standard case, the approach requires no manual processing, since the response can be created automatically from the processed data and the existing data about the processing within the service architecture. Using the same architecture for providing information as the underlying business ensures scalability. Thus, saving human resources at the controller s side results in a reduction of the response time from weeks to minutes, following the laws intention of a prompt response ([12], BDSG 34, recital 16). Only special cases have to be processed manually.however, even for manual cases, the response can be given as a Web Services again, if the official in charge creates the ROAR or ROAD response manually (or technically supported). On the flaws side, providing information on data processing beyond Web Services requires an interface and must be provided manually. This is no real flaw, because without Web Services it would have to be processed manually, too. Even then, manually processing ROAR and ROAD requests and responses could be possible, since Web Services use SOAP messages that can easily be converted to human-readable form (cf. [13]). For the same reason, you can participate even with manual processing in the otherwise fully automated ROAR/ROAD architecture. This provides resilience, if the automatic information fails. Adding the ROAD service suggests that a complete view on a business processes is provided to the data subject. This is not necessarily true, because responding on a ROAD request is technically and legally optional. However, a controller cannot remove herself from the response (but anonymize). The data subject is informed about the full list of recipients and sources and can at least assume further processing. In the unanonymized case, the data subject can direct a ROAR request to such controllers who are then legally obliged to answer. To conclude, if ROAR and ROAD services are used, then there is no disadvantage in comparison with manually providing information. B. Fulfilling Legal Obligations For fulfilling legal obligations it is not only necessary to provide the required information, but also to check the legitimated interests and to ensure the confidentiality of the provided information. As a rule, the information has to be provided in writing in a human readable and understandable form. When ever appropriate, the information can be provided in an other form ([12], BDSG 34, recital 14). In addition, the controller has the due diligence to check the requester s identity and legitimate interest ([12], BDSG 34, recital 6). To a greater extent, providing the wrong person with the information is a illegitimate service (in terms of law) and can be punished as an administrative offense (ibid.). Thus, it is in the best interest of controller and data subject to ensure a reliable authentication. Since method and procedure of the authentication is chosen by the controller ([12], BDSG 34, recital 7), the controller is responsible for the effectiveness of the authentication. 1) Checking the Legitimate Interest: In the standard case, the controller can assume a legitimate interest, if the requester references a previous communication or proves knowledge on the stored postal address ([12], BDSG 34, recital 7). As an exception from the standard case, providing information via ROAR/ROAD architecture requires additional actions on authentication. Essential for checking the legitimate interest is that the requester is the same person that has given the processed data. If the underlying data processing uses a datasubject-authenticator (cf. III-C1), then it is already linked to the context. Using this authenticator for the request for information proves that it is the same identity, since we assumed that the authenticator is unforgeable and under the data subject s control. If there is no such authenticator, then the data subject has to use the data-knowledge-authenticator (cf. III-C1) and identify himself, e.g. using a Class 3 certificate for signing this information. Thus, in any case, the legitimate interest of the requester can be determined. 2) Confidential Providing of Information: The controller has to ensure the exclusive delivery to the legitimated data subject. If the answer is given by letter, then this is ensured by using the correct postal address. For our architecture however, we have to bind the ability to read the answer to the identity of the data subject. This is done by encrypting the response under the data subject s public key that was provided with the request and authenticated as the data subject s during the legitimate interest check. This might be important, if the controller has to prove a delivery to the correct subject or, in case of an illegitimate service, has to name the wrongly informed subject. Thus, the law s intention to provide all information to the correct data subject is fulfilled. To conclude, the information is provided securely, as shown. Furthermore, it forms the basis for a human readable and understandable visualization (e.g. as proposed by the PRIME Project [14]). Hence, our ROAR/ROAD architecture is suitable. C. Right of Access and Protected Trade Secrets Currently, the law offers only one possibility to protect data sources and data recipients as a trade secret: To categorize them in the answer. As a result, the data subject cannot gain knowledge on data processing beyond the point of categorization. As categorization minimizes his right of access it goes against the laws intention (cf. II-A). Thus, trade secret and right of access end up conflicting each other. To resolve this conflict, we propose to delegate the request throughout the whole business process to collect information. 651

8 Since every controller knows its predecessor and successor, the request can also be continued if sources and recipients have to be categorized in the answer. It is upon the controller (or upon her predecessors or successors), if she categorizes her sources or recipients, if they are her trade secret. Thus, the controller must be able to sanitize signed answers before including them in the reply message. We achieve this by using a sanitizable signature scheme. Hence, we allow categorization to enable trade secret protection while providing a representation of the personal data s flow for the whole business process. Note, categorization is only effective, if all descendants or ancestors of an entity also categorize their answers. We achieve this by setting the anonymity flag in the request (cf. III-B) to indicate that all further triggered ROAD requests are to use categorization too. If a controller ignores this flag, then she violates the business contract with his predecessors or successors. Forensic investigation would reveal the violation, since the answer is signed by the controller, and allows imposition of liquidated damages. We achieve an efficient lookup as we restrict the delegated request to a specific context via correlation sets and allow only upwards (sources) or downwards (recipients) delegation. Restricting the context allows delegation, but results in reduced provided information. However, providing full information is not always helpful. The data subject would like to assess the impact of processing his personal data in a specific business process. Establishing this from dedicated ROAR requests for every participant is hard or even not possible, since the provided information can originate from several, but not distinguishable, business processes. Our solution of a ROAD request restricts the context, but allows business-process-traversal. Thus we create an added value, as it reveals the personal data s flow regarding to an actual business process. For legal compliance, the data subject has to authorize the controller to send ROAD requests. In this case, the validity of the mandate has to be verified by the receiver ([15], BDSG 33 recital 20). In our approach, the validity check is implemented by providing the data-subject-authenticator, the controller-authenticator, and the context-authenticator related to the correlation set. The data-subject-authenticator justifies the mandate, the controller-authenticator ensures correspondence with the correct mandate holder, and the contextauthenticator addresses the concerned business process. Overall, our architecture offers a trade-off between preserving trade secrets and providing information to the data subject. This is done in accordance with the law and also technically improves the process and enhances the provided information. V. CONCLUSION In this paper, we present a solution to automate the process of providing information according to the right of access for service-based business processes. We propose to add a Web Service for providing information to the data subject. To our consideration, the approach is sound and secure. We address the problem of scalability by using Web Services and provide solutions for the authentication and confidentiality. Additionally, we support keeping the trade secrets of the involved companies protectable as a great step forward in solving the general conflict between the economic goals of secrecy and informational self-determination. Additionally, our solution provides several advantages compared to the manual process: reduction of overall communication traffic (when using the ROAD approach), lower costs for an automated solution (compared to customer support center for manual processing), and shortened response time for a request. This is a first approach towards the target of full technical implementation of the data subject s indispensable rights of informational self-determination. Our solution builds upon existing technical architectures (Web Services), is motivated by business obligations, and implements one of these rights (right of access) according to the law. Future work is to analyze and implement the other rights. VI. ACKNOWLEDGMENTS We thank Focke Höhne for discussions on legal aspects. REFERENCES [1] EU, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal of 23 Nov. 1995, L 281, page 31-50, Nov [2] F. Kerschbaum and P. Robinson, Security architecture for virtual organizations of business web services, Journal of Systems Architecture, Special Issue on Secure SOA, vol. 55;4, pp , [3] C. M. MacKenzie and et al., Reference model for service oriented architecture 1.0, OASIS Standard, [4] S. Weerawarana and et al., Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More. Prentice Hall PTR, [5] D. Jordan and et al., Web Services Business Process Execution Language Version 2.0 (WS-BPEL 2.0), OASIS Standard, [6] E. Christensen, F. Curbera, G. Meredith, and S. Weerawarana, Web Services Description Language (WSDL), W3C Note, [7] G. Ateniese, D. H. Chou, B. D. Medeiros, and G. Tsudik, Sanitizable signatures, in ESORICS: Proceedings of the 10th European Symposium on Research in Computer Security. Springer-Verlag, 2005, pp [8] K. Miyazaki and et al., Digitally signed document sanitizing scheme with disclosure condition control, IEICE Transactions, [9] Z. Chen, A scenario for identity management in daidalos, in CNSR 07: Proceedings of the Fifth Annual Conference on Communication Networks and Services Research. Washington, DC, USA: IEEE Computer Society, 2007, pp [10] H. C. Pöhls, Verifiable and revocable expression of consent to processing of aggregated personal data, in ICICS 2008, ser. LNCS 5308, M. R. L. Chen and G. Wang, Eds. Springer, 2008, pp [11] Federal Republic of Germany, Bundesdatenschutzgesetz - BDSG (in German), [12] P. Gola and R. Schomerus, Bundesdatenschutzgesetz (BDSG), Kommentar (in German). Beck Juristischer Verlag, [13] S. Heinzl and et al., The web service browser: Automatic client generation and efficient data transfer for web services, in ICWS, 2009, pp [14] M. Bergmann, M. Rost, and J. Pettersson, Exploring the feasibility of a spatial user interface paradigm for privacy-enhancing technology, Advances in Information Systems Development: Bridging the Gap Between Academia and Industry, p. 437, [15] H.-J. Schaffland and N. Wiltfang, Bundesdatenschutzgesetz (BDSG), Ergaenzbarer Kommentar nebst einschlaegigen Rechtsvorschriften (in German). Erich Schmidt Verlag,

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3 DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC

More information

Making Reliable Web Services Message Exchanges Secure and Tamper Proof. Alan J Weissberger. Data Communications Technology. aweissberger@sbcglobal.

Making Reliable Web Services Message Exchanges Secure and Tamper Proof. Alan J Weissberger. Data Communications Technology. aweissberger@sbcglobal. Making Reliable Web Services Message Exchanges Secure and Tamper Proof Alan J Weissberger Data Communications Technology aweissberger@sbcglobal.net I. Composability of WS Reliability with WS Security IBM,

More information

Regular Expressions and Automata using Haskell

Regular Expressions and Automata using Haskell Regular Expressions and Automata using Haskell Simon Thompson Computing Laboratory University of Kent at Canterbury January 2000 Contents 1 Introduction 2 2 Regular Expressions 2 3 Matching regular expressions

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

Detection and mitigation of Web Services Attacks using Markov Model

Detection and mitigation of Web Services Attacks using Markov Model Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan RELAN1@UMBC.EDU Bhushan Sonawane BHUSHAN1@UMBC.EDU Department of Computer Science and Engineering, University of Maryland,

More information

Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators

Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators Branimir Wetzstein, Dimka Karastoyanova, Frank Leymann Institute of Architecture of Application Systems, University

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

Privacy and Identity Management for Europe

Privacy and Identity Management for Europe Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information

More information

Six Strategies for Building High Performance SOA Applications

Six Strategies for Building High Performance SOA Applications Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture

More information

OIO SAML Profile for Identity Tokens

OIO SAML Profile for Identity Tokens > OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6

More information

PRIVACY POLICY. Mil y Un Consejos Network. Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of

PRIVACY POLICY. Mil y Un Consejos Network. Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of PRIVACY POLICY Mil y Un Consejos Network Version Date: April 15th 2010 GENERAL Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of its users ( user or you ) whether they use

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

A Study on the Lack of Enforcement of Data Protection Acts

A Study on the Lack of Enforcement of Data Protection Acts A Study on the Lack of Enforcement of Data Protection Acts Thorben Burghardt 1, Klemens Böhm 1, Erik Buchmann 1, Jürgen Kühling 2, and Anastasios Sivridis 2 1 Universität Karlsruhe (TH), 76131 Karlsruhe,

More information

A Survey on Untransferable Anonymous Credentials

A Survey on Untransferable Anonymous Credentials A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches

More information

A Secure RFID Ticket System For Public Transport

A Secure RFID Ticket System For Public Transport A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It

More information

A System for Interactive Authorization for Business Processes for Web Services

A System for Interactive Authorization for Business Processes for Web Services A System for Interactive Authorization for Business Processes for Web Services Hristo Koshutanski and Fabio Massacci Dip. di Informatica e Telecomunicazioni - Univ. di Trento via Sommarive 14-38050 Povo

More information

INERTIA ETHICS MANUAL

INERTIA ETHICS MANUAL SEVENTH FRAMEWORK PROGRAMME Smart Energy Grids Project Title: Integrating Active, Flexible and Responsive Tertiary INERTIA Grant Agreement No: 318216 Collaborative Project INERTIA ETHICS MANUAL Responsible

More information

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129 Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the

More information

Recommendations for the PIA. Process for Enterprise Services Bus. Development

Recommendations for the PIA. Process for Enterprise Services Bus. Development Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by

More information

Model Business Associate Agreement

Model Business Associate Agreement Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model

More information

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716 Measurabl, Inc. ( Company ) is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regarding the Personal Data (as defined below) we collect from

More information

Patterns for Secure Boot and Secure Storage in Computer Systems

Patterns for Secure Boot and Secure Storage in Computer Systems Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de

More information

Qualified Electronic Signatures Act (SFS 2000:832)

Qualified Electronic Signatures Act (SFS 2000:832) Qualified Electronic Signatures Act (SFS 2000:832) The following is hereby enacted 1 Introductory provision 1 The purpose of this Act is to facilitate the use of electronic signatures, through provisions

More information

Merchants and Trade - Act No 28/2001 on electronic signatures

Merchants and Trade - Act No 28/2001 on electronic signatures This is an official translation. The original Icelandic text published in the Law Gazette is the authoritative text. Merchants and Trade - Act No 28/2001 on electronic signatures Chapter I Objectives and

More information

Privacy Policy. February, 2015 Page: 1

Privacy Policy. February, 2015 Page: 1 February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met

More information

Run-time Service Oriented Architecture (SOA) V 0.1

Run-time Service Oriented Architecture (SOA) V 0.1 Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...

More information

PRIVACY POLICY. I. Introduction. II. Information We Collect

PRIVACY POLICY. I. Introduction. II. Information We Collect PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting

More information

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to

More information

Code of Conduct of adidas AG Herzogenaurach

Code of Conduct of adidas AG Herzogenaurach Code of Conduct of adidas AG Herzogenaurach Date of issue: October 27, 2006 Table of Content 1. Basic Rules of Conduct 3 1.1 Executive s duties 3 1.2 Basic Rules and Common Sense 4 2. Treatment of Business

More information

Federated Identity Architectures

Federated Identity Architectures Federated Identity Architectures Uciel Fragoso-Rodriguez Instituto Tecnológico Autónomo de México, México {uciel@itam.mx} Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET Institut National des Télécommunications,

More information

Iowa Student Loan Online Privacy Statement

Iowa Student Loan Online Privacy Statement Iowa Student Loan Online Privacy Statement Revision date: Jan.6, 2014 Iowa Student Loan Liquidity Corporation ("Iowa Student Loan") understands that you are concerned about the privacy and security of

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

BSI TR-03108-1: Secure E-Mail Transport. Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails

BSI TR-03108-1: Secure E-Mail Transport. Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails BSI TR-03108-1: Secure E-Mail Transport Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails Version: 1.0 Date: 05/12/2016 Document history Version Date Editor Description

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we

More information

Opinion 04/2012 on Cookie Consent Exemption

Opinion 04/2012 on Cookie Consent Exemption ARTICLE 29 DATA PROTECTION WORKING PARTY 00879/12/EN WP 194 Opinion 04/2012 on Cookie Consent Exemption Adopted on 7 June 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is

More information

If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us.

If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us. c4m Privacy Policy Last Modified: July 20, 2015 Colbette II Ltd., Block 1, 195-197 Old Nicosia-Limassol Road, Dali Industrial Zone, Cyprus 2540 (hereinafter "c4m", Colbette we", "our" or "us") is always

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

A Pattern-Based Method for Identifying and Analyzing Laws

A Pattern-Based Method for Identifying and Analyzing Laws A Pattern-Based Method for Identifying and Analyzing Laws Kristian Beckers, Stephan Faßbender, Jan-Christoph Küster, and Holger Schmidt paluno - The Ruhr Institute for Software Technology University of

More information

AIRBUS GROUP BINDING CORPORATE RULES

AIRBUS GROUP BINDING CORPORATE RULES 1 AIRBUS GROUP BINDING CORPORATE RULES 2 Introduction The Binding Corporate Rules (hereinafter BCRs ) of the Airbus Group finalize the Airbus Group s provisions on the protection of Personal Data. These

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.

More information

Information Security

Information Security Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked

More information

Lightweight Data Integration using the WebComposition Data Grid Service

Lightweight Data Integration using the WebComposition Data Grid Service Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed

More information

GENERAL ELECTRIC COMPANY EMPLOYMENT DATA PROTECTION STANDARDS

GENERAL ELECTRIC COMPANY EMPLOYMENT DATA PROTECTION STANDARDS GENERAL ELECTRIC COMPANY EMPLOYMENT DATA PROTECTION STANDARDS December 2005 2 GENERAL ELECTRIC COMPANY EMPLOYMENT DATA PROTECTION STANDARDS I. OBJECTIVE... 1 II. SCOPE... 1 III. APPLICATION OF LOCAL LAWS...

More information

PRIVACY AND DATA SECURITY MODULE

PRIVACY AND DATA SECURITY MODULE "This project has been funded under the fourth AAL call, AAL-2011-4. This publication [communication] reflects the views only of the author, and the Commission cannot be held responsible for any use which

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

Network-based Access Control

Network-based Access Control Chapter 4 Network-based Access Control 4.1 Rationale and Motivation Over the past couple of years, a multitude of authentication and access control technologies have been designed and implemented. Although

More information

The role of integrated requirements management in software delivery.

The role of integrated requirements management in software delivery. Software development White paper October 2007 The role of integrated requirements Jim Heumann, requirements evangelist, IBM Rational 2 Contents 2 Introduction 2 What is integrated requirements management?

More information

Recommendations for companies planning to use Cloud computing services

Recommendations for companies planning to use Cloud computing services Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation

More information

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282 Web Service Security Anthony Papageorgiou IBM Development March 13, 2012 Session: 10282 Agenda Web Service Support Overview Security Basics and Terminology Pipeline Security Overview Identity Encryption

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com.

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

Corporate Policy. Data Protection for Data of Customers & Partners.

Corporate Policy. Data Protection for Data of Customers & Partners. Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble Ladies and gentlemen, Dear employees, The electronic processing of virtually all sales procedures, globalization and growing

More information

DDV Declaration Commissioned Data Processing and Data Treatment (Version: 09/2009)

DDV Declaration Commissioned Data Processing and Data Treatment (Version: 09/2009) DDV Declaration Commissioned Data Processing and Data Treatment (Version: 09/2009) Service provider: (in the following Service Provider ) Street, number ZIP code, city E-mail address Internet addresses

More information

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment

More information

MyNextConsultant.com Privacy Policy. Last updated: October 01, 2013

MyNextConsultant.com Privacy Policy. Last updated: October 01, 2013 MyNextConsultant.com Privacy Policy Last updated: October 01, 2013 1. About this Privacy Policy Thank you for using MyNextConsultant and visiting our website. Your privacy is important to us, and we have

More information

Federation Proxy for Cross Domain Identity Federation

Federation Proxy for Cross Domain Identity Federation Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 m-hatake@ax.jp.nec.com

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Secure Document Circulation Using Web Services Technologies

Secure Document Circulation Using Web Services Technologies Secure Document Circulation Using Web Services Technologies Shane Bracher Bond University, Gold Coast QLD 4229, Australia Siemens AG (Corporate Technology), Otto-Hahn-Ring 6, 81739 Munich, Germany sbracher@student.bond.edu.au

More information

Identity Provisions for Cloud Services: Applying OASIS SOA Reference Model

Identity Provisions for Cloud Services: Applying OASIS SOA Reference Model Identity Provisions for Cloud Services: Applying OASIS SOA Reference Model Presented by: Dr Michael Poulin Member & Co editor at SOA RM TC Member of AASCIT (American Association for Science and Technology)

More information

General Terms and Conditions of Trade for the use of the Bitplaces management platform and the Bitplaces software

General Terms and Conditions of Trade for the use of the Bitplaces management platform and the Bitplaces software General Terms and Conditions of Trade for the use of the Bitplaces management platform and the Bitplaces software I. Definitions, application area / conclusion of contract 1. Definitions 1.1 "App" in the

More information

eservices for Hospital Equipment

eservices for Hospital Equipment eservices for Hospital Equipment Merijn de Jonge 1, Wim van der Linden 1, and Rik Willems 2 1 Healthcare Systems Architecture Philips Research, The Netherlands 2 Strategy and Innovation Management/Technical

More information

This form may not be modified without prior approval from the Department of Justice.

This form may not be modified without prior approval from the Department of Justice. This form may not be modified without prior approval from the Department of Justice. Delete this header in execution (signature) version of agreement. HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate

More information

Service Line Warranties of Canada PRIVACY STATEMENT

Service Line Warranties of Canada PRIVACY STATEMENT Service Line Warranties of Canada PRIVACY STATEMENT We at Service Line Warranties of Canada ( us, our we, or Company ) consider the protection of your personal information to be a priority when you visit

More information

ONLINE PAYMENT PRIVACY POLICY

ONLINE PAYMENT PRIVACY POLICY ONLINE PAYMENT PRIVACY POLICY Updated: June, 2013 In order to operate the College online-payments system, Sanjari International College (SIC) may collect and store personal information student/customer

More information

LOAD BALANCING AS A STRATEGY LEARNING TASK

LOAD BALANCING AS A STRATEGY LEARNING TASK LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT

More information

A Service Modeling Approach with Business-Level Reusability and Extensibility

A Service Modeling Approach with Business-Level Reusability and Extensibility A Service Modeling Approach with Business-Level Reusability and Extensibility Jianwu Wang 1,2, Jian Yu 1, Yanbo Han 1 1 Institute of Computing Technology, Chinese Academy of Sciences, 100080, Beijing,

More information

PRINCIPLES OF THE TRANSFER OF PERSONAL DATA TO A THIRD COUNTRY. Introduction

PRINCIPLES OF THE TRANSFER OF PERSONAL DATA TO A THIRD COUNTRY. Introduction PRINCIPLES OF THE TRANSFER OF PERSONAL DATA TO A THIRD COUNTRY Introduction The continuous globalization of the world economy influences the international transfer of personal data. The transfer of personal

More information

Swedbank, AB payment services provision conditions

Swedbank, AB payment services provision conditions Swedbank, AB payment services provision conditions 1. TERMS 1.1. Terms used in these Swedbank, AB Payment Services Provision Regulations have the following meanings: 1.1.1. Personal Data means any information

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

Paladin Computers Privacy Policy Last Updated on April 26, 2006

Paladin Computers Privacy Policy Last Updated on April 26, 2006 Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our

More information

Demonstrating WSMX: Least Cost Supply Management

Demonstrating WSMX: Least Cost Supply Management Demonstrating WSMX: Least Cost Supply Management Eyal Oren 2, Alexander Wahler 1, Bernhard Schreder 1, Aleksandar Balaban 1, Michal Zaremba 2, and Maciej Zaremba 2 1 NIWA Web Solutions, Vienna, Austria

More information

WHAT INFORMATION IS COLLECTED AT MOTOROLA.COM.VN AND/OR MOTOROLA.VN AND HOW IS IT PROCESSED AND USED?

WHAT INFORMATION IS COLLECTED AT MOTOROLA.COM.VN AND/OR MOTOROLA.VN AND HOW IS IT PROCESSED AND USED? MOTOROLA PRIVACY POLICY This Privacy Statement ( Policy ) is subject to change at Motorola s discretion. If we decide to change this Policy, we will post the amended Policy on this website so you will

More information

Voucher Web Metering Using Identity Management Systems

Voucher Web Metering Using Identity Management Systems Voucher Web Metering Using Identity Management Systems Fahad Alarifi Abstract Web Metering is a method to find out content and services exposure to visitors. This paper proposes a visitor centric voucher

More information

SOFTWARE LICENSE AGREEMENT

SOFTWARE LICENSE AGREEMENT SOFTWARE LICENSE AGREEMENT This Software License Agreement (this Agreement ) is entered into as of the installation date of the software by and between Nanotron Technologies GmbH, a German corporation

More information

XML Signatures in an Enterprise Service Bus Environment

XML Signatures in an Enterprise Service Bus Environment XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany Eckehard.Hermann@softwareag.com Dieter Kessler Research

More information

COOPER US, INC. ELECTRONIC DATA INTERCHANGE (EDI) TRADING PARTNER AGREEMENT

COOPER US, INC. ELECTRONIC DATA INTERCHANGE (EDI) TRADING PARTNER AGREEMENT COOPER US, INC. ELECTRONIC DATA INTERCHANGE (EDI) TRADING PARTNER AGREEMENT This Electronic Data Interchange Agreement (this Agreement ) is between Cooper US, Inc., a Delaware corporation ( Cooper ), and

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services.

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. Stephen McGibbon Microsoft EMEA Tel. +445511490070 Email. stephenm@microsoft.com Abstract:

More information

Data Protection Policy.

Data Protection Policy. Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data

More information

COMMENTARY Scope & Purpose Definitions I. Education. II. Transparency III. Consumer Control

COMMENTARY Scope & Purpose Definitions I. Education. II. Transparency III. Consumer Control CONTENTS: SUMMARY SELF REGULATORY PRINCIPLES FOR ONLINE BEHAVIORAL ADVERTISING Introduction Definitions I. Education II. Transparency III. Consumer Control IV. Data Security V. Material Changes to Existing

More information

THIRD REGIONAL TRAINING WORKSHOP ON TAXATION. Brasilia, Brazil, December 3 5, 2002. Topic 4

THIRD REGIONAL TRAINING WORKSHOP ON TAXATION. Brasilia, Brazil, December 3 5, 2002. Topic 4 THIRD REGIONAL TRAINING WORKSHOP ON TAXATION Brasilia, Brazil, December 3 5, 2002 Topic 4 INFORMATION TECHNOLOGY IN SUPPORT OF THE TAX ADMINISTRATION FUNCTIONS AND TAXPAYER ASSISTANCE Nelson Gutierrez

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Aspect Oriented Strategy to model the Examination Management Systems

Aspect Oriented Strategy to model the Examination Management Systems Aspect Oriented Strategy to model the Examination Management Systems P.Durga 1, S.Jeevitha 2, A.Poomalai 3, Prof.M.Sowmiya 4 and Prof.S.Balamurugan 5 Department of IT, Kalaignar Karunanidhi Institute of

More information

Bank of Brodhead PO Box 108 806 E Exchange St Brodhead WI 53520-0108

Bank of Brodhead PO Box 108 806 E Exchange St Brodhead WI 53520-0108 Bank of Brodhead PO Box 108 806 E Exchange St Brodhead WI 53520-0108 Consumer Internet Banking Agreement and Disclosures 1. Coverage. This Agreement applies to your use of our Online Banking Service ("Internet

More information

SLA Business Management Based on Key Performance Indicators

SLA Business Management Based on Key Performance Indicators , July 4-6, 2012, London, U.K. SLA Business Management Based on Key Performance Indicators S. Al Aloussi Abstract-It is increasingly important that Service Level Agreements (SLAs) are taken into account

More information

Opt/Net Consulting BV Privacy Policy

Opt/Net Consulting BV Privacy Policy Opt/Net Consulting BV Privacy Policy Last Updated on 1 June - 2012 This Privacy Policy sets out the policy of Opt/Net Consulting BV with registered office at Kerkedijk 7 in Bergen NH, The Netherlands ("Opt/Net

More information

The primary responsibility for the data processing lies within the Administration Department, which the FINCOP Unit is part of.

The primary responsibility for the data processing lies within the Administration Department, which the FINCOP Unit is part of. Opinion on a Notification for Prior Checking received from the Data Protection Officer of the European Training Foundation Regarding the Processing Operations to Manage Calls for Tenders Brussels, 22 April

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is.

The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is. Trustwave Subscriber Agreement for Digital Certificates Ver. 11JUL14 PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE ISSUED

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1

More information

(Refer Slide Time 00:56)

(Refer Slide Time 00:56) Software Engineering Prof.N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-12 Data Modelling- ER diagrams, Mapping to relational model (Part -II) We will continue

More information